Cisco's implementation of ISDN BRI has multi protocol support,

SNMP MIB support, and what other features?

A.) Call waiting

B.) Compression

C.) ADSL

D.) 1.544 Mbps

E.) Call screening

F.) Negative 'G' support



Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what ot..

Answer / guest

Answer: B E

Caller ID is part of ISDN and you can screen calls based on it.

Cisco can compress with Stacker or Predictor.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What causes a triggered update to reset the router hold-down timer?

0 Answers  


What is the default behavior of access-list?

0 Answers  


How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode

3 Answers   Cisco, HCL,


Write the procedure for Router for configuring DHCP?

4 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  






GUYS i was refraining the OLD post and i got a good Question and wana make sure that you guys Just did not vist it for answers if you are not Aware google it understand it and then answered it the question is -: Significance of IP helper-address Command on SW? Is it necessary to put this command? you donot wana to give answer please donot visit this question and increase the vistor name if you are thinking that answer is wrong mark it wrong and explain why you are marking it wrong

0 Answers  


At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 Answers   EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

1 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

2 Answers  


NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

1 Answers  


IPX routing updates occur how often? A.) Every 30 seconds B.) Every 60 seconds C.) Only as needed D.) When the remote router asks for an update

1 Answers  


Categories